ARSA: An Attack-Resilient Security Architecture for Multi-hop Wireless Mesh Networks Ki-Woong Park Computer Engineering Research Laboratory Korea Advanced Institute Science & Technology Oct 18, 2007 IEEE Journal on Selected Areas in Communications, 2006
21
Embed
ARSA: An Attack-Resilient Security Architecture for Multi-hop Wireless Mesh Networks Ki-Woong Park Computer Engineering Research Laboratory Korea Advanced.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
ARSA: An Attack-Resilient Security Architecture for Multi-hop Wireless Mesh Networks
Ki-Woong ParkComputer Engineering Research Laboratory
Korea Advanced Institute Science & TechnologyOct 18, 2007
IEEE Journal on Selected Areas in Communications, 2006
Critique No experiment / Simulation Result Computationally Efficiency Difference with Kerberos / PKINIT Comparison with PKI
17/20
COMPANY LOGO18/23
Symmetric Key Asymmetric Key / IBC
Key
One Key - One Key to encrypt the
data - One Key to decrypt the
data
Two keys - Public key to encrypt the data - Private key to decrypt the data
Confidentiality
Yes Yes
Digital Signature
No Yes
Non-repudiation
No Yes
Key Distribution
No Yes
Speed (ATmega)
3ms 472ms
Usage T-money (300ms), SpeedPass (100ms) [1] Internet Banking, E-Commerce
Symmetric Key vs. Asymmetric Key
[1] F.Vieira, J.Bonnet, C.Lobo, R.Schmitz, and T.Wall “Security Requirements for Ubiquitous Computing,” EURESCOM. 2005[2] A.Pirzada and C.McDonald, “Kerberos Assisted Authentication in Mobile Ad-hoc Networks," in Proceedings of ACM International Conference Proceeding Series; Vol. 56, 2004.